Secure by Design: Building Security into Engineering Workflows and Teams

Security doesn't have to be a blocker- it can be an enabler. In this session, we’ll explore how to seamlessly integrate secure development practices into engineering workflows while fostering a culture of collaboration and shared ownership. From integrating security into IDEs, build pipelines, and CI/CD workflows to empowering developers with real-time vulnerability detection, we’ll showcase practical strategies to make security second nature for your team.

But secure development is about more than just tools - it’s about people. We'll discuss how to break down silos between developers and security teams, embed security champions in your organization, and leverage engaging, gamified training to build confidence and capability in secure coding practices.

Walk away with actionable insights to shift security left, enable your team to innovate without fear, and create workflows that blend security seamlessly into everyday development. Let’s build software that’s secure by design - together.


Speaker

Stefania Chaplin

Solutions Architect @GitLab

Stefania’s (aka DevStefOps) experience as a Solutions Architect within DevSecOps, Security Awareness and Software Supply Chain Management means she's helped countless organizations understand and implement security throughout their SDLC. As a python developer at heart, Stefania enjoys optimizing and improving operational efficiency by scripting & automating processes and creating integrations. She has spoken at many conferences including RSA, DevOps Enterprise Summit, Blackhat, Qcon, ADDO and Women in DevOps. When not at a computer, Stefania enjoys surfing, yoga and looking after all her tropical plants

Read more

From the same track

Session

Securing AI Copilots: Including Supply Chain Security in AI Strategy

Details coming soon.

Speaker image - Andra Lezza

Andra Lezza

Principal Application Security Engineer @Sage, Co-Leader OWASP London Chapter, and ex-Checkout.com, Bulb, and Worldpay

Session

Trust No One: Securing the Modern Software Supply Chain with Zero Trust

Can you truly trust your software supply chain? As cloud-native software development surges, threat actors increasingly target the supply chain, exploiting vulnerabilities in CI/CD pipelines, dependencies, and container images.

Speaker image - Emma Yuan Fang

Emma Yuan Fang

Senior Cloud Security Architect @EPAM, DevSecOps, Cloud Security Advocate, Strategist and Public Speaker, Ex-Microsoft, CISSP